Ask any question about EPFL courses, lectures, exercises, research, news, etc. or try the example questions below.
DISCLAIMER: The Graph Chatbot is not programmed to provide explicit or categorical answers to your questions. Rather, it transforms your questions into API requests that are distributed across the various IT services officially administered by EPFL. Its purpose is solely to collect and recommend relevant references to content that you can explore to help you answer your questions.
Explores BGP security weaknesses, real-world incidents, and defenses against BGP hijacking, emphasizing the importance of cryptography in securing routing information.
Explores the critical role of cybersecurity in protecting humanitarian organizations from cyber attacks and emphasizes the need for basic security measures and external support.
Explores adversarial thinking, common weaknesses, and ineffective defenses in software systems, emphasizing the importance of mitigating prevalent vulnerabilities.
Delves into cybersecurity, cyber conflict, and civil society's role in mitigating cyber risks, emphasizing the importance of threat awareness and expertise building.